IJMTES – ENHANCED CO-OPERATIVE SCHEME FOR MOBILE ADHOC NETWORKS

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Rakesh Kumar ER

Volume 01 Issue 12  Year 2014  

ISSN no:  2348-3121 

Page no: 1-6

Abstract— In mobile ad hoc networks (MANETs), cooperating nodes with each other is a key requirement for the establishment of communication among nodes. In the presence of wicked nodes, this kind of necessity may lead to severe security related concerns. In case, such nodes may interrupt the routing process. For preventing malicious nodes we propose to develop an enhanced co-operative bait detection scheme for detecting collaborative attacks in MANET. In this scheme, source node selects an adjacent node using the random scheduling process. The address of this adjacent node is used as bait destination address to bait malicious nodes in order to send a reply message. After the detection of malicious nodes, the packet delivery ratio (PDR) value is ensured with the threshold value, from this, the again the bait detection process is triggered.

Keywords— Malicious Node, Collaborative Attacks, Adjacent Node, Bait Detection

Reference

[1] Meenakshi Patel and Sanjay Sharma, “Detection of Malicious Attack in MANET A Behavioral Approach”, IEEE 3rd International Advance Computing Conference (IACC), pp. 388 – 393, (2012).
[2] ReshmaLill Mathew, P. Petchimuthu, “Detecting Selfish Nodes in MANETs Using Collaborative Watchdogs”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 3, ISSN: 2277 128X, March (2013).
[3] Umesh Kumar Singh, KailashPhuleria,Shailja Sharma and D.N. Goswami, “An analysis of Security Attacks found in Mobile Ad-hoc Network”, International Journal of Scientific & Engineering Research, vol. 5, Issue 5, ISSN 2229-5518, May-(2014).
[4] Tao Gong and Bharat Bhargava, “Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model”, Security and Communication Networks, Vol. 6, Issue 1, pp. 58–68, January (2013).
[5] Ajay Dureja and VandnaDahiya, “Performance Evaluation of Collaborative Attacks in Manet”, A Monthly Journal of Computer Science and Information Technology (IJCSMC), vol. 3, Issue. 7, pp. 457 – 465, ISSN 2320–088X, July (2014).
[6] Cong Hoan Vu and AdeyinkaSoneye, “An Analysis of Collaborative Attacks on Mobile Ad hoc networks”, LAP LAMBERT Academic Publishing, June (2009).
[7] Bharat Bhargava, Ruy de Oliveira, Yu Zhang and Nwokedi C. Idika, “Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks ”, 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 447 – 450, ISSN :1545-0678, (2009).
[8] Mahdi Nouri, SomayehAbazariAghdam and SajjadAbazariAghdam, “Collaborative Techniques for Detecting Wormhole Attack in MANETs”, International Conference onResearch and Innovation in Information Systems (ICRIIS), pp. 1- 6, (2011).
[9] Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai, “Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach”, IEEE SYSTEMS JOURNAL, vol. PP, Issue: 99, ISSN: 1932-8184, pp. 1 – 11, (2014).
[10] JaydipSen, M. Girish Chandra, P. Balamuralidhar, Harihara and S.G., Harish Reddy, “A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks”, IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, pp. 75 – 80, (2007).
[11] Chang Wu Yu, Tung-Kuang Wu, ReiHeng Cheng and Shun Chao Chang, “ A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks”, Emerging Technologies in Knowledge Discovery and Data Mining Lecture Notes in Computer Science,Vol. 4819,pp. 538-549, (2007).
[12] Weichao Wang, Bharat Bhargava and Mark Linderman, “Defending against Collaborative Packet Drop Attacks on MANETs”, 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS), Vol. 27, (2009).
[13] Network Simulator: http:///www.isi.edu/nsnam/ns.

Full Pdf Paper: Click Here

 

Scroll Up